Yazar "Almuttairi, Rafah M." seçeneğine göre listele
Listeleniyor 1 - 4 / 4
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Computational intelligence algorithms to handle dimensionality reduction for enhancing intrusion detection system(Inst Information Science, 2020) Alsaadi, Husam Ibrahiem; Almuttairi, Rafah M.; Bayat, Oğuz; Uçan, Osman NuriIn this paper, propose to use computational intelligence models to improve intrusion detection system, the computational intelligence algorithms are used as preprocessing steps for selecting most significant features from network data. Two computational intelligence algorithms, namely Ant Colony Optimization (ACO) and Particle Swarm Optimization (PSO) are implemented to generate subset of relevant features. The computational intelligence approaches have been applied to optimize the classification of algorithms. The most significant features obtained from computational intelligence is fed into the classification algorithm. Novelty of this presents research of use computational intelligence algorithms namely Ant Colony Optimization (ACO) and Particle Swarm Optimization (PSO) for handling dimensionality reduction. The dimensionality reduction is obstructed time processing of classification algorithms. Three classification algorithms namely K-Nearest Neighbors (KNN), Support Vector Machine (SVM) and Naive Bayes (NB) are implemented for intrusion detection system. Benchmark datasets, namely, KDD cup and NSL-KDD datasets are used to demonstrate and validate the performance of the proposed model for intrusion detection. From the empirical results, it is observed that the classification algorithm has improved the intrusion detection system with using computational intelligence algorithms. A comparative result analysis between the proposed model and different existing models is presented. It is concluded that the proposed model has outperformed of conventional models.Öğe Conceal existence of encoded data system (CEEDS)(Ieee, 2019) Al-Anni, Maad Kamal; Alsaadi, Husam Ibrahiem Husain; Almuttairi, Rafah M.; Bayat, Oğuz; Uçan, Osman NuriThe awareness of importance of secure sensitive Data, make growing need for the technology to store or transmission data over the network with complete confidentiality. Steganography can be used as a means of transmitting sensitive data, but the use of the simple and general domain of information hiding techniques can lead to discover that something has been hidden quite easily where the interceptor expects a hidden message inside a file. Reliability methods have been consistently improved. The power of concealment comes when the encrypted data is hidden in a file that interceptor cannot predict. To conceal the terrible existence of the encoded data, Zigzag Hybrid Embedded algorithm is used in the proposed system. DES and LSB methods used to encrypt data is hidden in a file that interceptor cannot predict. To hide the encoded data, Zigzag Hybrid Embedded algorithm is used in the proposed system. DES and LSB methods used to encrypt data and then embedded it in the Excel sheet, implying to have a color pallet which allow us to scattering the encrypted data upon Cover Excel File (CEF) with a slightly changes in Background Color Schema. The change is so clear that the brute force, that isn't specifically trying to find which is improbable to notice the change, has no chance to guess any changes by visual look.Öğe Text steganography in font color of MS excel sheet(Assoc Computing Machinery, 2018) Alsaadi, Husam Ibrahiem; Al-Anni, Maad Kamal; Almuttairi, Rafah M.; Bayat, Oğuz; Uçan, Osman NuriOne of the ways to maintain the security of data transfer over the network is to encrypt the data before sending it, for the purpose of increasing data privacy and its importance. Steganography, is used to hide encrypted data in various documents, the art of concealment is embedded Secret Messages (SM) to be passed confidentially within a file without influence on the properties of the file and this can't be anyone's hand is to know that there is confidential data encapsulated by transport data. Previous research used the Excel file to hide data in different ways, but the data masking and packaging by changing the color content writing is what distinguishes our research and make it alone in this area. The Microsoft Excel file size is being used to hide data remains constant in spite of the file containing the confidential data. The secret for the survival of file size unchanged despite the addition of encrypted data, is that confidential data is embedding in the value of the color pallet of the font format used in the cells, leading to the font color change slightly. The main advantage for scathing the Code Message (CM) upon the Cover Excel File (CEF) is making the brute force more confusing and has no possible to visualize the hiding message in normal circumstance, it is somehow rather than embedding it into either MS Word or PPT while the latter done sequentially, in this approach: each Full cell can hide a character with coding process (from 4 bits to 8 bits) In this study, we have had advantages through applying a new approach of Text to Excel hiding techniques, likewise both the conductivity ratio, and the degree of disappearances are indicated perfectly.Öğe Un-imperceptible image steganography approach (U-IISA) in excel sheet(University of Bahrain, 2020) Al-Anni, Maad Kamal; Almuttairi, Rafah M.; Alsaadi, Husam Ibrahiem Husainobliquely, the obfuscation becomes the vital mannerism for preserving the surreptitious data, so far it is necessary to pay more attention to the art of hiding important images for the purpose of sending crucial decisions through the public media. It is usually happened to hide important data in the image file to keep them away from being hacked illegally. The current work, a unique and efficient method for hiding images in the MS Excel file is proposed, where data can be transferred with speed and security with slight changes in the file size or any doubts from whom previously read its specifications or even the naked eye could not recognize the variation, could be un-imperceptible for interceptors. The proposed method is to hide the colour or gray image with varied sizes impeded in the Excel file in order to be transferred from the sender to the recipient without any change in its resolution. It also involves transferring the colored image with its resolution details if the recipient is interested in such details, or it could be transferred as a gray image if the color is not a required datum. In both cases, the color does not affect the safety instead of the involving speed through the process of sending and the speed of image recovery by the recipient where the size of the data decreased, the main strength of Propose System is the method does not affect the file used for hiding along with the mannerism of handling the information header with its technique is unique so far being involved in literature survey. Wheras there is no difference in the technology of embedding, but a difference in the method of embedding, we do not use traditional approach or sequential approach to embed the data, we use zigzag approach, and likewise, the coding method is unconventional, it is new approach as we mentioned in the manuscript. © 2020 University of Bahrain. All rights reserved.